Anomaly-based framework for detecting dynamic spectrum access attacks in cognitive radio networks
暂无分享,去创建一个
Yaser Jararweh | Houbing Song | Haythem Bany Salameh | Abdallah Alturani | Lo'ai Ali Tawalbeh | Houbing Song | L. Tawalbeh | H. Salameh | Y. Jararweh | Abdallah Alturani
[1] Mee Hong Ling,et al. Trust and reputation management in cognitive radio networks: a survey , 2014, Secur. Commun. Networks.
[2] T. Charles Clancy,et al. Security in Cognitive Radio Networks: Threats and Mitigation , 2008, 2008 3rd International Conference on Cognitive Radio Oriented Wireless Networks and Communications (CrownCom 2008).
[3] Shamik Sengupta,et al. Vulnerabilities in cognitive radio networks: A survey , 2013, Comput. Commun..
[4] Alexandros G. Fragkiadakis,et al. Anomaly-based intrusion detection of jamming attacks, local versus collaborative detection , 2015, Wirel. Commun. Mob. Comput..
[5] Song Han,et al. Cognitive radio network security: A survey , 2012, J. Netw. Comput. Appl..
[6] Yang Liao,et al. A jury-based trust management mechanism in distributed cognitive radio networks , 2015 .
[7] Miguel Soriano,et al. Securing cognitive radio networks , 2010 .
[8] Nora Cuppens-Boulahia,et al. Advanced Reaction Using Risk Assessment in Intrusion Detection Systems , 2007, CRITIS.
[9] Nora Cuppens-Boulahia,et al. Automated reaction based on risk analysis and attackers skills in intrusion detection systems , 2008, 2008 Third International Conference on Risks and Security of Internet and Systems.
[10] Beongku An,et al. Outage performance of physical layer security for multi-hop underlay cognitive radio networks with imperfect channel state information , 2016, 2016 International Conference on Electronics, Information, and Communications (ICEIC).
[11] Cheng Li,et al. The security in cognitive radio networks: a survey , 2009, IWCMC.
[12] Anjali Agarwal,et al. A survey on security in Cognitive Radio networks , 2014, 2014 6th International Conference on Computer Science and Information Technology (CSIT).
[13] Wei-Ping Zhu,et al. Energy efficient optimization for physical layer security in cognitive relay networks , 2016, 2016 IEEE International Conference on Communications (ICC).
[14] Danda B. Rawat,et al. Recent security issues on cognitive radio networks: A survey , 2016, SoutheastCon 2016.
[15] H. B. Barlow,et al. Unsupervised Learning , 1989, Neural Computation.
[16] Salvatore J. Stolfo,et al. A Geometric Framework for Unsupervised Anomaly Detection , 2002, Applications of Data Mining in Computer Security.
[17] Salim Hariri,et al. Anomaly-based Protection Approach against Wireless Network Attacks , 2007, IEEE International Conference on Pervasive Services.
[18] Jeffrey H. Reed,et al. Case Study: Security Analysis of a Dynamic Spectrum Access Radio System , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.
[19] Chen Gang,et al. A SDN-based energy saving strategy in wireless access networks , 2015, China Communications.
[20] Álvaro Araujo,et al. PUE attack detection in CWSNs using anomaly detection techniques , 2013, EURASIP J. Wirel. Commun. Netw..
[21] Jeffrey H. Reed,et al. Defense against Primary User Emulation Attacks in Cognitive Radio Networks , 2008, IEEE Journal on Selected Areas in Communications.
[22] Gabriel Maciá-Fernández,et al. Anomaly-based network intrusion detection: Techniques, systems and challenges , 2009, Comput. Secur..
[23] Ferenc Szidarovszky,et al. Multi-Level Intrusion Detection System (ML-IDS) , 2008, 2008 International Conference on Autonomic Computing.
[24] Zhu Han,et al. Interference Improves PHY Security for Cognitive Radio Networks , 2016, IEEE Transactions on Information Forensics and Security.
[25] Salim Hariri,et al. Anomaly-Based Behavior Analysis of Wireless Network Security , 2007, 2007 Fourth Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services (MobiQuitous).
[26] Eleazar Eskin,et al. A GEOMETRIC FRAMEWORK FOR UNSUPERVISED ANOMALY DETECTION: DETECTING INTRUSIONS IN UNLABELED DATA , 2002 .
[27] Mahmoud Al-Ayyoub,et al. Software defined framework for multi-cell Cognitive Radio Networks , 2014, 2014 IEEE 10th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).
[28] S. M. Kamruzzaman,et al. Anonymous and Secure Communication Protocol for Cognitive Radio Ad Hoc Networks , 2014, 2014 IEEE International Symposium on Multimedia.
[29] J. Morris Chang,et al. A layered approach to cognitive radio network security: A survey , 2014, Comput. Networks.
[30] Haythem Bany Salameh,et al. Efficient Resource Allocation for Multicell Heterogeneous Cognitive Networks With Varying Spectrum Availability , 2016, IEEE Transactions on Vehicular Technology.
[31] Yenumula B. Reddy,et al. Security Issues and Threats in Cognitive Radio Networks , 2013 .
[32] Lijun Qian,et al. Anomalous spectrum usage attack detection in cognitive radio wireless networks , 2011, 2011 IEEE International Conference on Technologies for Homeland Security (HST).
[33] Edmundo Monteiro,et al. A survey on security attacks and countermeasures with primary user detection in cognitive radio networks , 2015, EURASIP J. Inf. Secur..
[34] Danda B. Rawat,et al. Advances on Security Threats and Countermeasures for Cognitive Radio Networks: A Survey , 2015, IEEE Communications Surveys & Tutorials.
[35] Danda B. Rawat,et al. Analyzing energy efficient physical layer security in large-scale MIMO enabled CRN with QoS requirements , 2016, 2016 IEEE Conference on Communications and Network Security (CNS).
[36] Salim Hariri,et al. A proactive wireless self-protection system , 2008, ICPS '08.
[37] Hannes Federrath,et al. Laribus: privacy-preserving detection of fake SSL certificates with a social P2P notary network , 2013, 2013 International Conference on Availability, Reliability and Security.
[38] Haythem Bany Salameh,et al. A Batch-Based MAC Design With Simultaneous Assignment Decisions for Improved Throughput in Guard-Band-Constrained Cognitive Networks , 2016, IEEE Transactions on Communications.
[39] James B. D. Joshi,et al. Security in Dynamic Spectrum Access Systems: A Survey , 2009 .
[40] Larry J. Greenstein,et al. ALDO: An Anomaly Detection Framework for Dynamic Spectrum Access Networks , 2009, IEEE INFOCOM 2009.
[41] Ferenc Szidarovszky,et al. A game theory based risk and impact analysis method for Intrusion Defense Systems , 2009, 2009 IEEE/ACS International Conference on Computer Systems and Applications.
[42] Zhiyong Feng,et al. A survey of security issues in Cognitive Radio Networks , 2015 .
[43] K. J. Ray Liu,et al. Optimal Defense against Jamming Attacks in Cognitive Radio Networks Using the Markov Decision Process Approach , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.
[44] Yu Liu,et al. Multiwave: A novel vehicle steering pattern detection method based on smartphones , 2016, 2016 IEEE International Conference on Communications (ICC).
[45] Ajith Abraham,et al. Rule-Based Expert Systems , 2005 .
[46] Young-Koo Lee,et al. An Anomaly Detection Algorithm for Detecting Attacks in Wireless Sensor Networks , 2006, ISI.